Embedded Extended Visual Cryptography Schemes - PowerPoint PPT Presentation

About This Presentation
Title:

Embedded Extended Visual Cryptography Schemes

Description:

it is based on secret image... – PowerPoint PPT presentation

Number of Views:4213
Slides: 22
Provided by: KAIF
Category: Other
Tags:

less

Transcript and Presenter's Notes

Title: Embedded Extended Visual Cryptography Schemes


1
Embedded Extended Visual Cryptography Schemes
  • By
  • SHAIK TABREZ(09J01A1225)
  • ISMAIL IMANI(09J01A1232)
  • MOHD AHMED(O9J01A1221)

2
INTRODUCTION
  • THE basic principle of the visual cryptography
    scheme (VCS) was first introduced by Naor and
    Shamir. VCS is a kind of secret sharing scheme
    that focuses on sharing secret images.

3
The idea of the visual cryptography model
proposed in is to split a secret image into two
random shares (printed on transparencies) which
separately reveals no information about the
secret image other than the size of the secret
image.
4
The size of all the images is 768768
The size of all the images is 768 768.
5
BRIEF OVERVIEW OF DOMAIN
  • (Information Security)
  • The quality or state of being secure to be free
    from danger
  • Security is achieved using several strategies63
  • Security is achieved using several strategies
    simultaneously or used in combination with one
    another

6
  • Security is recognized as essential to protect
    vital processes and the systems that provide
    those processes
  • Security is not something you buy, it is
    something you do

7
PREVIOUS WORK
  • Visual cryptography is the art and science of
    encrypting the image in such a way that no-one
    apart from the sender and intended recipient even
    realizes the original image, a form of security
    through obscurity. By contrast, cryptography
    obscures the original image, but it does not
    conceal the fact that it is not the actual image.

8
LIMITATIONS
  • The existing system does not provide a friendly
    environment to encrypt or decrypt the data
    (images).

9
  • PROPOSED SYSTEM
  • Visual cryptography provides a friendly
    environment to deal with images. Generally
    cryptography tools supports only one kind of
    image formats. Our application supports .gif and
    .png (portable network graphics) formatted images
    and our application has been developed using
    swing and applet technologies, hence provides a
    friendly environment to users.

10
 ADVANTAGES OF PROPOSED SYSTEM
  • EVCS is flexible in the sense that there exist
    two trade-offs between the share pixel expansion
    and the visual quality of the shares and between
    the secret image pixel expansion and the visual
    quality of the shares.
  • This flexibility allows the dealer to choose the
    proper parameters for different applications.

11
MODULE S
  • This application consist FOUR modules
  • VISUAL CRYPTOGRAPHY IMPLEMENTATION
  • ENCODING
  • DECODING
  • TESTING AND INTEGRATION

12
1. VISUAL CRYPTOGRAPHY IMPLEMENTATION
  • This module is the core for the project, where we
    implement the Visual Cryptography. We used LZW
    Data Compression algorithm. The LZW data
    compression algorithm is applied for the gray
    scale image here.

13
2.ENCODING
  • The algorithm works by scanning through the input
    string for successively longer substrings until
    it finds one that is not in the dictionary

14
3.DECODING
  • The decoding algorithm works by reading a value
    from the encoded input and outputting the
    corresponding string from the initialized
    dictionary
  • the final input value is decoded without any more
    additions to the dictionary

15
4.TESTING AND INTEGRATION
  •  
  • This is the final module, which consists of
    integration of Visual cryptography implementation
    module into interface design using applet viewer.

16
SYSTEM ARCHITECTURE
SELECT IMAGE
SELECT NON TRANSPRANCIE
  • SENDER

ENCRYPT
SAVE TRANSPRANCIES
RECIEVER
17
HARDWARE AND SOFTWARE REQUIREMENTS
  • HARDWARE REQUIREMENTS
  • System Pentium IV 2.4 GHz.
  • Hard Disk 40 GB.
  • Floppy Drive 1.44 Mb
  • Ram 512 Mb.

18
SOFTWARE REQUIREMENTS
  • Operating system Windows XP
  • Coding Language JDK 1.6
  • Tools Netbeans

19
CONCLUSION
  • we proposed a construction of EVCS which was
    realized by embedding the random shares into the
    meaningful covering shares.
  • The shares of the proposed scheme are meaningful
    images, and the stacking of a qualified subset of
    shares will recover the secret image visually.
  • the visual quality of the shares and between the
    secret image pixel expansion and the visual
    quality of the shares.

20
(No Transcript)
21
  • Thank you!!!!!!
Write a Comment
User Comments (0)
About PowerShow.com